The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A secure audio steganography technique is introduced in this paper. Here modulo operator is used for hiding target string. The embedding as well as extracting process is of two steps which provides more robustness in this method. During preprocessing the hexadecimal equivalent of target string is calculated by taking four bits at a time. That increases capacity of cover media. Modulo operator is used...
We propose QUEST (QUality ESTimation), a new method that accurately estimates IEEE 802.11 wireless link quality with no in-band signaling overhead. Existing link quality estimation methods either are based on hello exchanges by fixing or varying transmission rates or rely on the history (e.g., delivery ratio) of previously sent data packets in a per-rate/-neighbor manner. QUEST on the other hand,...
The paper presents an approach to the design of layered BICM MIMO systems using multi-stage iterative decoding and Soft Output M-Algorithm (SOMA) based component decoders. The systems consider transmission based on multilevel coding linked to hierarchical QAM constellations. The receivers are iterative designs with a view to supporting high-rates. These receiver designs can also be used to obtain...
A lossless or reversible steganography is defined as an original image can be completely recovered from the stego-image after the embedded data has been extracted. This technique has been focused on spatial uncompressed domain recently, and is considered more challenging to carry out in the compressed domain. In this paper, we propose a lossless, compressed domain steganography technique for AMBTC-compressed...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Some communication applications, like multimedia, deliver data of different importance classes allowing unequal error protection (UEP) levels. In this paper, a multiple-input multiple-output (MIMO) system using orthogonal frequency division multiplexing (OFDM) is considered with a new UEP bit-loading algorithm based on the non-UEP algorithm by Chow, Cioffi, and Bingham. In the proposed bit-loading...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Video-streaming can now be offered on third-generation (3G) mobile networks. Most research efforts have focused on video download. This paper presents a detailed study of challenges faced for successfully deploying applications requiring life video upload. Both subjective and objective qualities as well as the effects of mobility are analyzed on real 3G networks. Consequently, video profiles are identified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.